期刊文献+

电力信息系统建模和定量安全评估 被引量:26

Modeling and Quantitative Security Evaluation for Electric Power Information Systems
下载PDF
导出
摘要 提出一种用于电力信息系统安全设计的建模语言和定量化评估方法。设计了安全体系设计迹语言,统一描述系统结构、系统业务、安全策略、攻击行为和安全措施等;构造了风险自动分析算法,以获得电力信息系统的攻击迹;基于攻击迹提出相对安全度概念,用于定量评估安全体系的安全性;通过实例验证了所述方法的有效性。该方法可用于定量评估各类安全措施的控制效果,如增加新的安全功能、调整系统自身结构和用户业务需求等,减少了选择安全措施的主观性。 A modeling language and a quantitative evaluation approach to the security of power information systems are presented. A security architecture design trace language is first worked out to uniformly describe the system structures, services, security policies, attack behaviors and countermeasures. Then an automated risk analyzing algorithm is proposed to obtain the attack traces of the power information system. And based on the concept of the relative security degree, the security architecture can be quantitatively evaluated. Finally, with a case study in an actual power information system, the effectiveness of the approach proposed is demonstrated. In practice, the approach can be employed for assessing various kinds of countermeasures, such as increasing a new security function, adjusting system self-structure, and changing customer operation requirements. And it can greatly reduce the subjectivity of countermeasure selection.
出处 《电力系统自动化》 EI CSCD 北大核心 2005年第10期30-35,共6页 Automation of Electric Power Systems
关键词 计算机和网络安全 电力信息系统 建模 定量安全评估 风险分析 规范语言 Information technology Mathematical models Risk assessment Security of data
  • 相关文献

参考文献10

  • 1胡炎,董名垂,韩英铎.电力工业信息安全的思考[J].电力系统自动化,2002,26(7):1-4. 被引量:78
  • 2NSTAC IATF. Electric Power Information Assurance Risk Assessment. 1997.
  • 3National Security Agency Information Assurance Solutions Technical Directors. Information Assurance Technical Framework. Release 3.1. http:∥www. iatf. net/, 2002.
  • 4Systems Security Engineering Capability Maturity Model: Model Description Document. Version 2.0. SSE-CMM Project. 1999.
  • 5STONEBURNER G, GOGUEN A, FERINGA A. Risk Management Guide for Information Technology Systems. NIST SP 800-30. 2002.
  • 6Information Technology--Guidelines for the Management of IT Security, Part 3: Techniques for the Management of IT Security. ISO/IEC TR 13335-3. 1998.
  • 7ZELEZNIK M P. Security Design in Distributed Computing Applications, Doctoral Dissertation. Lalee City (UT, USA):University of Utah, 1993.
  • 8SCHWEITZER E J. Security News. ACM SIGSAC Review,1988, 6: 17.
  • 9RAMAKRISHNAN C R, SEKAR R. Model-based Analysis of Configuration Vulnerabilities. Journal of Computer Security,2002, 10(1-2): 189-209.
  • 10KOLMAN B, BUSBY R C, ROSS S C. Discrete Mathematical Structures, 3rd ed. Beijing: Tsinghua University Press, 1997.

二级参考文献7

共引文献77

同被引文献285

引证文献26

二级引证文献377

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部